Suggested Topics within your search.
Suggested Topics within your search.
- Research 58
- Methodology 29
- Social sciences 10
- Study and teaching 10
- Mass media 8
- Education 7
- English language 7
- Evaluation research (Social action programs) 7
- Moral and ethical aspects 7
- Psychological aspects 7
- Psychology 7
- Report writing 7
- methods 7
- research 7
- Dissertations, Academic 6
- History 6
- Sociology 6
- Consumers 5
- Evaluation 5
- Management 5
- Research--Methodology 5
- Sex role 5
- Social conditions 5
- Academic writing 4
- Conversation analysis 4
- Information technology 4
- Qualitative research 4
- Rhetoric 4
- Social aspects 4
- Technological innovations 4
-
341
Research on deterministic computing power network
Published 2022-10-01“…In order to meet the development requirements of time-sensitive and computing-intensive businesses, the guarantee problem of real-time transmission and real-time computing of computing tasks was studied.Firstly, the research progress of computing power network and deterministic networking was briefly overviewed.Then, the technical scheme of deterministic computing power network was proposed, and the technical architecture and working mechanism were designed.Real-time transmission and real-time computing of computing tasks were realized through the technical capabilities such as computing-network perception, planning and scheduling, resource management and control.The simulation results also verified the effectiveness of the proposed technical scheme.Finally, the representative application scenarios of deterministic computing power network were analyzed, and the future development trends and technical challenges were discussed.…”
Get full text
Article -
342
Research and implement on the intrusion tolerant system
Published 2006-01-01“…Intrusion tolerance technologies guarantee systems provided essential services by the fullest extent when some intrusions sneak into them.Architecture of an intrusion-tolerant system was proposed and intrusion tolerance technologies in node-level and system-level were practiced.Online intrusion diagnosis and redirection technology were researched to harden the system automatically.Experiment results illuminate that system providing service continuously can be set up and applied in the condition that does not require response time strictly but demands continuous implementation.…”
Get full text
Article -
343
MARKETING RESEARCH IN THE FIELD OF PUBLIC ADMINISTRATION
Published 2024-12-01Subjects: “…public administration, marketing, public marketing, marketing research, marketing tools, marketing in public administration, qualitative research.…”
Get full text
Article -
344
The Need for Critical Thinking in Rehabilitation Research
Published 2021-08-01Get full text
Article -
345
-
346
-
347
Research on WebRTC Technology and Application
Published 2013-09-01“…At the end, a summary of research topics and overview of future development were given.…”
Get full text
Article -
348
METHODICAL PROBLEM IN THE RESEARCHES OF EDUCATIONAL HISTORY
Published 2009-05-01“…The main aim of this study is to attract attention to the methodical problem in research of educational history. Method, is a way that must be pursued for scientific researches. …”
Get full text
Article -
349
Institutions: Definition, Attributes and Research Areas
Published 2016-09-01“…The author offers his own original picture of the institutional architecture of the socio-economic system and proves subsequent research areas of institutional economics.…”
Get full text
Article -
350
Meditation in Qualitative Research for Bracketing and Beyond
Published 2025-12-01“…I propose that bracketing, with the aim of meditation is inseparable from qualitative research. Meditation, as a form of bracketing, provokes the researcher to be fully present ensuring that participants’ experiences are heard and interpreted in a faithful manner. …”
Get full text
Article -
351
-
352
RESEARCH ON KEY PARAMETER FOR FORKLIFT STABILITY
Published 2022-01-01“…Counterbalanced forklifts is a kind of industrial vehicles specially used for handling, loading and unloading, having a wide range of uses, and the working environment is becoming more and more complex. Research on the stability of counterbalanced forklifts is becoming more and more important, but stability has attracted less attention in the academic community. …”
Get full text
Article -
353
Research on security of third-party tracking
Published 2014-09-01“…Third-party tracking can record users' behaviors across many websites.Increasing attention has been paid to the area of third-party tracking due to the fact that user's privacy protection is causing wider concern.The basic concept and present development were introduced.And security risks were also summarized.Then main technology of third-party tracking was intrduced from stateful tracking and stateless tracking aspects.Furthermore,several existing defenses of third-party tracking were described and compared.Finally,some hot research topics were given and the future research directions were discussed.…”
Get full text
Article -
354
-
355
Research on the correlation of mental disorders and terrorism
Published 2024-01-01“…As this topic has been very little researched, and there is a significant scientific gap, the author came to several conclusions with the help of a comparative analysis of existing empirical studies. …”
Get full text
Article -
356
Research on Jersey and application in Web services
Published 2014-10-01“…In order to solve the current Web components appear weak poor scalability,the generality of the interface,interactive delay time problem,put forward the lightweight REST architecture,the Jersey is the REST architecture-the realization of the JAX-RS interface standards,through the research of its connectivity,addressable,statelessness,and stability and ease of use features,design a set of unified,efficient,fast and convenient access to the server Client API,implemented as different intelligent mobile terminal with unified Web application services.…”
Get full text
Article -
357
-
358
Research progress of sensor-cloud security
Published 2018-03-01“…Through consulting lots of domestic and international literatures about sensor-cloud security,a series of security problems are found,such as reputation problem of service provider,the coupling problem of physical nodes,the leak of authority management,et al,which seriously hinders the further development of sensor-cloud.The secure problems occurring in sensor-cloud were analyzed,the current secure technologies were contrasted ,similarities and differences of various types solutions were discussed and summarized.After that,several future challenges of sensor-cloud security were concluded.Finally,a fog-based structure was proposed to solve the security problems,which would bring new ideas to the sensor-cloud security research.…”
Get full text
Article -
359
INNOVATION STRUCTURE FOR RESEARCH ACTIVITIES AT THE UNIVERSITY
Published 2016-12-01Subjects: Get full text
Article -
360
Qualitative research is about listening and growing
Published 2025-01-01Subjects: “…Qualitative research in healthcare…”
Get full text
Article